CXO

Executives, finance wizards, technology, information, and security experts are all represented by the X in CXO. Here is where you'll find the latest research and expertise to drive leadership in all these categories.

  • Hiring Kit: Security Analyst

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Successfully finding and recruiting suitable candidates for Security Analyst requires a well thought out plan of action. This hiring kit provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for Security Analyst in your organization. From the hiring kit INTRODUCTION For most modern...

    Download Now
  • Hiring kit: Cryptographer

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    A cryptographer uses their expertise in mathematics and computer science to develop algorithms, ciphers, and other encryption systems to protect sensitive data. It can be a difficult position to fill. Using this hiring kit as a template you can find, recruit, and hire the best cryptographer candidate for your business....

    Download Now
  • Hiring kit: Blockchain Engineer

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Recruiting candidates with advanced software engineering experience and a least some familiarity with applied blockchain technology will take time and effort. This hiring kit provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for Blockchain Engineer in your organization. From the Hiring kit...

    Download Now
  • Moonlighting policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Moonlighting, the practice of working for another organization in a separate job in addition to one’s current employment, is a fairly common practice these days. It’s especially frequent in technology where people with varying skills and backgrounds may find their abilities in demand by multiple companies and in need of...

    Download Now
  • Hiring kit: Salesforce Developer

    Tools & Templates · Aug 2019 · Provided By TechRepublic Premium

    No matter what business your enterprise is in, developing a better, more complete relationship with your customers will always be beneficial to your bottom line. The cloud-based customer relationship management (CRM) system offered by Salesforce.com has emerged as one of the more powerful platforms available in this regard. However, to...

    View This Now
  • Perimeter security policy

    White Papers · Aug 2019 · Provided By TechRepublic Premium

    As the saying goes, a chain is only as strong as its weakest link. This applies more than ever to cybersecurity implementations designed to protect organizations from malicious attacks, intruders and vulnerabilities. While security principles should apply throughout the organization, locking down the perimeter and ensuring only necessary connections get...

    Download Now
  • Special feature: Industry cloud (free PDF)

    Ebooks · Jul 2019 · Provided By TechRepublic

    The industry cloud has taken off and big businesses have been built by the likes of Veeva, Rootstock, and others. Here's why the focus has allowed the industry to thrive even as giants like Salesforce, Oracle, and SAP eye their turf. This ebook, based on the latest ZDNet/TechRepublic special feature,...

    View This Now
  • 50 overused cliches to avoid in business (free PDF)

    Downloads · Jul 2019 · Provided By TechRepublic

    Business jargon and clichés can make you sound flippant and annoying at best, or confusing and uncreative at worst. This article looks at the worst offenders. From the article Overused buzzwords and phrases used to feel fresh but they long ago lost their creativity and impact. If you’re in a...

    Find Out More
  • How imposter syndrome is infecting the workplace (free PDF)

    Ebooks · Jul 2019 · Provided By TechRepublic

    Imposter syndrome is a common problem that can affect people in a multitude of different ways. This ebook provides expert advice about why imposter syndrome persists in the workforce and how to prevent it from consuming your life. It also includes articles about how imposter syndrome effects the gender gap...

    View This Now
  • User privilege policy

    Downloads · Jul 2019 · Provided By TechRepublic Premium

    This policy provides guidelines for the delegation of user privileges on organization-owned systems. It also provides guidance for usage of high-privilege or administrator accounts. From the policy: SUMMARY The risk potential of running user-initiated tasks using the same access levels as components of the operating system is staggeringly high, particularly...

    Download Now